IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 
Definition continues below.
Security Management White Papers (View All Report Types)
1 - 25 of 1508 Matches Previous Page  |  Next Page
Maturing and Specializing: Incident Response Capabilities Needed
sponsored by Intel Security
WHITE PAPER: This white paper looks into global survey results on current incident response strategies and tools employed by your peers. Learn best practices for anticipating, planning, testing and validating response procedures for the worst attacks—because, inevitably, they are coming.
Posted: 06 May 2016 | Published: 31 Aug 2015

Intel Security

Orchestrating Security in the Cloud
sponsored by Intel Security
WHITE PAPER: The following report takes a look at survey results about cloud computing in today's organizations and reasons behind the growing trend.
Posted: 06 May 2016 | Published: 30 Sep 2015

Intel Security

Leveraging Threat Intelligence In Incident Response
sponsored by Intel Security
WHITE PAPER: This white paper is designed to help you build the right security workforce, give them the best processes, and provide the tools necessary to protect your enterprise data.
Posted: 06 May 2016 | Published: 21 Aug 2014

Intel Security

A Cloud Security Primer
sponsored by Intel Security
WHITE PAPER: The shift to cloud computing is one of the most significant IT initiatives of our time and there is no standard adoption method With the different cloud models and methods, this leaves room for confusion to set in. Whether or not you've already adopted cloud technology, aceess this white paper now to prepare for the inevitable attacks.
Posted: 06 May 2016 | Published: 29 Apr 2016

Intel Security

Emergency Incident Response: 10 Common Mistakes of Incident Responders
sponsored by Intel Security
WHITE PAPER: This white paper highlights the top 10 common emergency incident response mistakes that organizations commonly make. Access now to prevent your enterprise from suffering from these shortcomings and ensure your current incident response practices are effective and secure.
Posted: 06 May 2016 | Published: 31 Dec 2012

Intel Security

The 5 Characteristics of an Intelligence-Driven Security Operations Center
sponsored by Intel Security
WHITE PAPER: Access this report by Gartner to examine the challenges traditional security operations centers face, and how you can build an intelligence-driven one that can handle today's dynamic threat and risk environment.
Posted: 06 May 2016 | Published: 15 Nov 2015

Intel Security

The What, the Why, and the How of Hybrid Cloud
sponsored by Intel Security
WHITE PAPER: Many of us have come to think of "The Cloud" as referring to public or private cloud. However, hybrid cloud means not having to choose, and if you do, then you can switch back and forth as needed. Access this comprehensive white paper to learn about what hybrid clouds are, why they're beneficial and how to take full advantage of them.
Posted: 06 May 2016 | Published: 27 Apr 2016

Intel Security

Think Like an Attacker: Six Steps Toward Better Security
sponsored by Intel Security
WHITE PAPER: Discover in this expert white paper why piecemeal endpoint defenses are not are sufficient to protect against today's threat vectors—and think like an attacker to bolster your defenses. Read on to take 6 steps toward better security, including learning to redefine your perimeter, and more.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

Security that Plays Well with Others
sponsored by Intel Security
WHITE PAPER: As cyberattacks increase in volume and sophistication, organizations need to present a unified coordinated defense. Discover how an open, integrated security architecture can help you coordinate your siloed legacy security products and simplify the threat defense lifecycle.
Posted: 06 May 2016 | Published: 31 Dec 2015

Intel Security

Securosis: SIEM Kung Fu
sponsored by Intel Security
WHITE PAPER: In this extensive research report, learn how to make the most of your existing security information and event management product or service. Discover key tips to this end, including: focus on the adversary, master response, and 2 more. Also, find a detailed rundown of advanced SIEM use cases.
Posted: 06 May 2016 | Published: 21 Apr 2016

Intel Security

ESG Lab Validation Report: McAfee Next Generation SIEM
sponsored by Intel Security
WHITE PAPER: Access this ESG lab validation report to discover how a holistic approach that can leverage multiple interconnected security solutions as a unified ecosystem might be the answer to modern IT security dilemmas.
Posted: 06 May 2016 | Published: 30 Apr 2015

Intel Security

Understanding Cyberthreat Motivations to Improve Defense
sponsored by Intel Security
WHITE PAPER: Learn from this exclusive white paper why you must add cyber-criminal motivation to your threat taxonomy, in order to understand what causes a threat agent to commit harmful acts. Read on to discover in detail the elements of this new parameter.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

Advanced security from the inside with VMware NSX
sponsored by VMware
WHITE PAPER: This white paper shows you a new way to implement data center security that constantly monitors threats while you're away. Now fine-grained threat isolation, segmentation and centralized control are all possible inside your data center. Access now to learn how you can gain fully streamlined operations and centralized control today.
Posted: 05 May 2016 | Published: 01 Apr 2016

VMware

Control and Secure Sensitive Data
sponsored by Citrix
WHITE PAPER: Enterprise file sync and sharing (EFSS) services have become valuable tools as they allow organizations to delve into mobility without compromising data security or compliance. Access this resource to learn about an EFSS service that provides IT teams with flexibility, visibility and control over sensitive data.
Posted: 04 May 2016 | Published: 30 Dec 2015

Citrix

Ensuring Document Security Across Any Device
sponsored by BlackBerry
WHITE PAPER: Mobile devices have become more common in the workplace and produced a goal of ensuring that sensitive documents can be shared and accessed securely from any device. Access this white paper to learn about a solution that circumvents device management and instead allows for management of the documents themselves.
Posted: 04 May 2016 | Published: 05 Apr 2016

BlackBerry

Client Virtualization Solutions Deliver Enhanced Security and Compliance While Lowering Costs
sponsored by Dell, Inc., Intel and VMware
WHITE PAPER: As a financial services institution, you need to make data security, audit compliance, and risk mitigation a top priority while also adapting to highly demanding and increasingly mobile customers. This white paper details how client virtualization allows you to control your data safely in a data center while enabling mobile access to data and apps.
Posted: 03 May 2016 | Published: 03 May 2016

Dell, Inc., Intel and VMware

The Workstation Monitoring Imperative
sponsored by Intersect Alliance
WHITE PAPER: This white paper shows you how to better monitor your corporate data as it travels along your workstations – see who is accessing this data and where it's being stored and accessed. Access now to not only better secure your data, but also adhere to current compliance standards like PCI DSS, HIPPA and SOX and FISMA.
Posted: 02 May 2016 | Published: 01 Apr 2016

Intersect Alliance

For Enterprise IT: Extend Your VPN to Bring Better Security, Performance, Reliability to the Cloud
sponsored by AT&T
WHITE PAPER: As clouds are increasingly being used to store business-critical applications and data, they become more likely targets for attacks. Using public Internet to access your clouds is like leaving a window open. Access this white paper to learn how to ensure security and shut attackers out with VPN-based connectivity for the cloud.
Posted: 29 Apr 2016 | Published: 20 Apr 2016

AT&T

FortinetCSO_QP
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper analyzes today's advanced threats and today's cybersecurity environment to show you what organizations are doing right and what they are doing wrong. Access now to learn how to effectively counter threats by preventing, detecting and mitigating malware and other malicious actors.
Posted: 29 Apr 2016 | Published: 01 Mar 2016

Fortinet, Inc.

Protecting_Against_APTs_minibook
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper helps you better understand the security challenges that businesses face today. Access now to learn insight from a range of industry analysts, consultants and hands-on experts on how they believe you should tackle your security problems.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Cybersecurity and Data Theft Prevention
sponsored by Forcepoint
WHITE PAPER: This white paper provides a non-technical overview on cybersecurity and provides topics that every CEO should consider. Learn how to identify the critical data at the heart of your organization and conduct an in-depth assessment of your current security posture.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Forcepoint

University of Texas at Austin Ensures Network Security for its Distributed Campus
sponsored by Splunk
WHITE PAPER: Access this brief case study to learn how one top-ranked state research university saw significant benefits when they implemented a tool that met the needs of network and information security analysis. Uncover the benefits they achieved by helping their analysts investigate security threats and incidents faster and more accurately.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

Splunk

SG-ISFW-Fortinet
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper teaches you about internal segmentation firewalls that can provide your organization with an additional layer of protection inside your network perimeters. It protects critical assets while enhancing their ability to detect breaches and shorten mitigation delays.
Posted: 28 Apr 2016 | Published: 01 Mar 2016

Fortinet, Inc.

Build A High-Performance, Customer-Obsessed Security Organization
sponsored by AllClear ID
WHITE PAPER: This white paper provides CISOs with an end-to-end look at what it takes to build a high-performance security practice. Access now to learn how to build a risk management framework that's designed to support changing business models and retain customer trust.
Posted: 28 Apr 2016 | Published: 09 Feb 2016

AllClear ID

Defend Against The Undetected
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper shows you a complete, cohesive automated framework that covers all parts of your network from cloud to the perimeter to the endpoints. Access now to learn the three elements you must focus on to ensure the security of your data.
Posted: 28 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.
1 - 25 of 1508 Matches Previous Page    1 2 3 4    Next Page
 
SECURITY MANAGEMENT DEFINITION (continued): …  will succeed. A well-designed strategy of this kind can also help system administrators and security personnel identify people who attempt to compromise a computer, server, proprietary network or ISP (Internet service provider). If a hacker gains access to a system, defense in depth minimizes the adverse impact and gives administrators and engineers time to deploy new or updated countermeasures to prevent recurrence.Components of defense in depth include antivirus software, firewalls, anti-spyware programs, hierarchical passwords, intrusion detection and biometric verification. In addition to … 
Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement